Главная
Study mode:
on
1
Intro
2
Motivation
3
Research Questions
4
Methods
5
Outline
6
Public Computer Access
7
Email: New Technology
8
Typing Difficulties
9
Remembering Passwords
10
Security Questions
11
Birthdays
12
Two Factor Auth
13
Case Managers
14
Website Legitimacy
15
Computer Education
16
Summary
Description:
Explore a comprehensive analysis of computer security and privacy challenges faced by recently resettled refugees in the United States in this 21-minute IEEE conference talk. Delve into refugees' technology usage, security practices, and barriers they encounter during resettlement. Examine how advice from case managers and teachers shapes refugees' mental models and practices regarding computer security. Discover key findings from qualitative interviews and focus groups, including refugees' heavy reliance on technology for establishing their lives and finding employment. Understand how language barriers, limited technical expertise, and cultural differences impact refugees' ability to implement common security best practices. Learn about the unique challenges refugees face, such as unfamiliarity with scams and difficulties with password creation techniques based on US cultural knowledge. Gain valuable insights and recommendations for the computer security community to better address the needs and constraints of this potentially vulnerable population. Read more

Computer Security and Privacy for Refugees in the United States

IEEE
Add to list
0:00 / 0:00